-
### Describe the bug
The session mappings in OpenWrt maintained for TCP connections can be removed by off-path attackers on the Internet via crafted TCP RST packets. After that, the attacker crafts a…
-
l have some issues when running your code( on the branch for Windows.):
1、When I try to use www.cnn.com, it redirects to edition.cnn.com.So I changed the domain name of the attacked server to edit…
-
Vulnerable Library - spring-boot-starter-undertow-2.7.1.jar
Path to dependency file: /pom.xml
Path to vulnerable library: /pom.xml
Found in HEAD commit: a3762d2a9c628f21954d94fed724cf20e41a5847
…
-
Right now as I understand it, the source uploads a sensitive document, that document is sent over Tor to the hidden service running on the source server, that source server encrypts the document, and …
-
## WS-2020-0111 - High Severity Vulnerability
Vulnerable Library - apollo-server-express-1.4.0.tgz
Production-ready Node.js GraphQL server for Express and Connect
Library home page: https://registry…
-
## WS-2020-0116 - High Severity Vulnerability
Vulnerable Library - apollo-server-lambda-1.3.6.tgz
Production-ready Node.js GraphQL server for AWS Lambda
Library home page: https://registry.npmjs.org…
-
## CVE-2019-10639 - High Severity Vulnerability
Vulnerable Libraries - linuxlinux-4.4.302, linuxlinux-4.4.302
Vulnerability Details
The Linux kernel 4.x (starting from 4.1) and 5.x befor…
-
## CVE-2020-11612 - High Severity Vulnerability
Vulnerable Libraries - netty-all-4.1.27.Final.jar, netty-all-4.1.42.Final.jar
netty-all-4.1.27.Final.jar
Netty is an asynchronous event-driven netwo…
-
Looks like the problem in these chunk of code:
```ruby
old = $VERBOSE.dup
$VERBOSE = nil
Object.methods.each do |e|
delegate e, to: :@__object__
end
$VERBOSE = old
```
The error looks like:…
-
### Current Behaviour
Practically all ads on the server spawn in and attack instantly, practically getting an auto-attack off before they've even phased in. (This may also apply to respawns in the op…